This module exploits a NULL pointer dereference in NVIDIA Reality Server Software, when a crafted package is send to port 1935.
Citrix EdgeSight is prone to a Denial of Service within the LauncherService.exe component which listens by default on TCP port 18747. When handling a request the process trusts a user supplied field in the packet specifying the length of data to follow, the process then copies the user supplied data, without validation, into a fixed-length buffer on the heap.
This updates improves the reliability and AV Evasion of Microsoft Internet Explorer Tabular Data Control ActiveX Exploit.
This module exploits a design flaw in HP Data Protector by sending a specially crafted EXEC_SETUP request.
The specific flaw exists within the implementation of the EXEC_SETUP command. This command instructs a Data Protector client to download and execute a setup file. A malicious attacker can instruct the client to access a file off of a share thus executing arbitrary code under the context of the current user.
The specific flaw exists within the implementation of the EXEC_SETUP command. This command instructs a Data Protector client to download and execute a setup file. A malicious attacker can instruct the client to access a file off of a share thus executing arbitrary code under the context of the current user.
Flash Player is prone to a memory corruption vulnerability that is caused by the lack of bounds-checking when indexing the arguments of a function.
This can be exploited to execute arbitrary code by enticing an unsuspecting user to visit a malicious Web page containing a specially crafted SWF file.
This exploit bypasses ASLR and DEP in order to deploy an agent.
This can be exploited to execute arbitrary code by enticing an unsuspecting user to visit a malicious Web page containing a specially crafted SWF file.
This exploit bypasses ASLR and DEP in order to deploy an agent.
A vulnerability found on Siemens FactoryLink vulnerability occurs when CSService.exe processes a CSMSG_ListFiles_REQ message, causing a stack overflow.
This module exploits a buffer overflow vulnerability in HP Data
Protector by sending a specially crafted packet to the vulnerable
Omniinet.exe service.
Protector by sending a specially crafted packet to the vulnerable
Omniinet.exe service.
The Timed Interactive Multimedia Extensions implementation in Microsoft Internet Explorer does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that was not properly initialized or is deleted.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a vulnerability in the Microsoft WINS service by sending a request packet followed by a RESET connection packet to the service.
The RDS service (rds.exe) in HP Data Protector Manager 6.11 allows remote attackers to cause a denial of service via a packet with a large data size to TCP port 1530.
Pagination
- Previous page
- Page 129
- Next page